Security experts say Apple’s security system allowed the hacking of iPhone X from Amazon CEO Jeff Bezos
Apple is proud of the iPhone’s next-generation security system, but researchers suggest that this is what allowed Amazon’s CEO Jeff Bezos to attack the smartphone.
The tech giant controls the operating system and, since almost every iPhone runs on the same version, a sophisticated attacker finds a single vulnerability that can penetrate any phone, even high-profile people.
Apple believes that less visibility into the system means that fewer errors will be discovered, which will allow it to remain more secure, so the company is very reserved about the code.
In the case of Bezos, hackers probably exploited a series of errors that Apple had overlooked and allowed them to avoid all layers of “considerable phone defenses,” according to The Washington Post.
Experts now suggest that ‘VIP and special people’ change their iPhones for a personalized Android smartphone, because although it may have more vulnerability, it allows professionals to find and repair them.
Scroll down to watch the video
Apple takes pride in the iPhone’s next-generation security system, but researchers suggest that this is what allowed Amazon’s CEO Jeff Bezos to attack the smartphone (pictured). In the case of Bezos, hackers probably exploited a series of errors that Apple had missed to make it go through all layers of the phone’s considerable defenses.
Last week news emerged that Bezos’ iPhone X was hacked in 2018 after receiving a malicious WhatsApp message from the crown prince of Saudi Arabia, months before the National Enquirer revealed his adventure.
According to the forensic examination of the subsequent telephone, the message was sent on May 1, 2018.
Within hours, a large amount of Bezos iPhone data was extracted.
Apple has been against allowing security researchers to bypass security restrictions to look inside the operating system to detect vulnerabilities that may have gone unnoticed.
However, security researchers are trying new ways to avoid Apple’s stalemate to determine if iPhones have been hacked.
Last week, news emerged that Bezos’ iPhone X was hacked in 2018 after receiving a malicious WhatsApp message from the crown prince of Saudi Arabia (pictured), months before National Enquirer revealed his adventure. A few hours after receiving the message, a large amount of Bezos iPhone data was extracted
Zec Ops, a two-year-old cybersecurity firm, focuses on helping high-profile businesses and individuals.
Customers are asked to connect their iPhone to a computer or kiosk that loads data records to a server, so that Zec Ops employees can see what happens within the technology.
HOW THE ‘HACK’ WAS DISPLAYED
September 2017: David Pecker, the editor of AMI, reportedly meets Mohammed bin Salman
April 2018: The crown prince attends a dinner in Hollywood organized by producer Brian Grazer, where he meets Jeff Bezos.
May 1: The video is sent from the prince’s phone to Bezos through WhatsApp
October 2018: Washington Post columnist Jamal Khashoggi is killed by the Saudi regime
January 2019: The National Enquirer publishes its presentation on the Bezos issue with Lauren Sanchez
March 2019: Bezos ‘private investigator, Gavin De Becker, says he has evidence that Saudi Arabia hacked Bezos’ phone – Saudi Arabia denies
January 2020: The Guardian reports that the prince’s message was the source of the hack. A UN report reaches the same conclusion
Zuk Avraham, co-founder and CEO of Zec Ops, that at first glance, the records look like a messy computer code.
But for those technology experts, it provides clues that a hacker may have left on the scene.
After analyzing tens of thousands of phones, Avraham says it estimates that 2 to 3 percent of them showed possible attack indicators.
“Apple is doing a relatively good job to secure those devices,” said Avraham.
But breaking into a remote “is still within the capabilities of a talented individual.”
Researchers are also using the process called ‘jailbreak’, which requires that they physically install new software on the smartphone.
However, Apple has pointed out time and again that doing so violates a federal law known as the “Digital Millennium Copyright Law.”
Google, on the other hand, seems to believe that the more eyes, the better.
The company has given public access to its operating system, allowing them to look for faults that otherwise would never have been found.
It also allows researchers to use virtual Android devices.
When researchers can penetrate the iOS of an iPhone and find faults, they actually hide their findings from Apple.
When researchers can penetrate the iOS (stock) of an iPhone and find faults, they actually hide their findings from Apple. They worry that Apple will ‘patch’ them immediately and prevent these experts from conducting more tests
They are concerned that Apple will ‘patch’ them immediately and prevent these experts from conducting more tests.
The Washington Post also noted that “the black market for iPhone mistakes has flourished” and these people are offering their piracy skills to the government, or anyone willing to pay.
The United Nations issued a report last week suggesting that Saudi Arabia may have used the malicious malicious spyware created by the Israeli company NSO Group to hack Jeff Bezos’s phone and steal his naked selfies.
The UN High Commissioner for Human Rights suggested that Pegasus spyware from NSO Group was the “most likely” explanation for stolen Bezos phone data.
The report notes that the Saudi Arabian Royal Guard acquired Pegasus-3 spyware from the NSO Group in a November 2017 contract.
UN experts said Bezos phone hacking occurred during a period in which the phones of two close partners of Jamal Khashoggi were also hacked, allegedly using Pegasus malware.